General
-
Target
19e4e3709e119a2fbc133ed33d5ca870N.exe
-
Size
431KB
-
Sample
240818-rdtxjazcqp
-
MD5
19e4e3709e119a2fbc133ed33d5ca870
-
SHA1
bc1da98274e84d5dbf43b0679d2d78e7e2f6e793
-
SHA256
866357e962c7516d795535877166011be9cd8e5ff16fba354b7f9cdf44c2cc9a
-
SHA512
5883ae539d134c8d606f11f40af13cce6ee8fdfee6346867cd2ffa8678217d9ea14416ef737ec82230cb35bdbcfc701211f59b7c8a6e9693aeed93c950e21162
-
SSDEEP
12288:IXi0ig1VCpPgYO+TqxeqFcOH72olHki9r:IXivg1VCpZOCqxkOH7TB9
Behavioral task
behavioral1
Sample
19e4e3709e119a2fbc133ed33d5ca870N.dll
Resource
win7-20240705-en
Malware Config
Targets
-
-
Target
19e4e3709e119a2fbc133ed33d5ca870N.exe
-
Size
431KB
-
MD5
19e4e3709e119a2fbc133ed33d5ca870
-
SHA1
bc1da98274e84d5dbf43b0679d2d78e7e2f6e793
-
SHA256
866357e962c7516d795535877166011be9cd8e5ff16fba354b7f9cdf44c2cc9a
-
SHA512
5883ae539d134c8d606f11f40af13cce6ee8fdfee6346867cd2ffa8678217d9ea14416ef737ec82230cb35bdbcfc701211f59b7c8a6e9693aeed93c950e21162
-
SSDEEP
12288:IXi0ig1VCpPgYO+TqxeqFcOH72olHki9r:IXivg1VCpZOCqxkOH7TB9
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-